Process Engineering White Papers

1-3 of 3 < first | prev | next | last >
  • Chemical Processing Special Report: Secure plan(t)

    In the decade before Stuxnet attacked process control systems in Iran, there were just five known supervisory control and data acquisition (SCADA) vulnerabilities for all control systems in the world, according to the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). In 2011, the year after Stuxnet, that vulnerability count jumped to more than 215. Last year, it reached 248 (Figure 1). No surprise then that Chemical makers are increasingly focusing on protecting their process control systems from intrusion both from the inside and outside. In this Chemical Processing Special Report: Secure plan(t), we take a look at:
    How to better protect your control system - “Defense in depth” is crucial, and new and maturing technologies may help
    Cyber Security Challenges – learn about countermeasures to protect control systems
    Case Study: A vulnerability assessment reveals critical gaps in the security of a natural gas pipeline
    How to mitigate security risks in legacy process control systems  - several steps can help protect against threats and extend the life of legacy equipment
    Learn how to secure your process control systems – and your plant. Download your copy of this Chemical Processing Special Report: Secure plan(t) now.

  • The 7 Steps to ICS and SCADA Security

    The past two years have been a real wakeup call for the industrial automation industry. For the first time ever it has been the target of sophisticated cyber attacks like Stuxnet, Night Dragon and Duqu.

    In addition, an unprecedented number of security vulnerabilities have been exposed in industrial control products and regulatory agencies are demanding compliance to complex and confusing regulations. Cyber security has quickly become a serious issue for professionals in the process and critical infrastructure industries.

    If you are a process control engineer, an IT professional in a company with an automation division, or a business manager responsible for safety or security, you may be wondering how your organization can get moving on more robust cyber security practices.

    In order to provide you with guidance in this area, Tofino Security and exida Consulting LLC have condensed material from numerous industry standards and best practice documents. They also combined experience in assessing the security of dozens of industrial control systems.

    The result is an easy-to-follow 7-step process.

    Tofino Security and exida Consulting LLC
  • Using Operator Interfaces to Optimize Performance of Industrial Wireless Networks

    The performance of wireless networks can change over time due to increased performance demands, changes in the radio frequency (RF) environment and changes in the physical environment. This article will explore the use of a wireless diagnostic OLE for Process Control (OPC) server technology to embed diagnostic information in human machine interfaces (HMIs), thus optimizing industrial wireless network performance.

    Jim Ralston, Wireless Sales Engineer, ProSoft Technology
1-3 of 3 < first | prev | next | last >